<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>SI Digital Magazine</provider_name><provider_url>https://magazine.swissinformatics.org/it/</provider_url><author_name>Fridel Rickenbacher</author_name><author_url>https://magazine.swissinformatics.org/it/author/fridel/</author_url><title>Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz - SI Digital Magazine</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="E5xIkbIspI"&gt;&lt;a href="https://magazine.swissinformatics.org/it/relevant-software/"&gt;Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://magazine.swissinformatics.org/it/relevant-software/embed/#?secret=E5xIkbIspI" width="600" height="338" title="&#x201C;Safety. Relevant. Software. Secure Coding. CyberSecurity-Resilienz&#x201D; &#x2014; SI Digital Magazine" data-secret="E5xIkbIspI" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://magazine.swissinformatics.org/wp-content/uploads/2018/06/Privacy_Security_ReadersColumn_Winter.png</thumbnail_url><thumbnail_width>612</thumbnail_width><thumbnail_height>344</thumbnail_height><description>The digitization of processes in all industries and in administration is progressing with great momentum. New opportunities, new processes, new dependencies, new risks are constantly emerging. Old things are becoming obsolete and the dynamic &#x201C;state of the art&#x201D; is becoming increasingly relevant and challenging. This has led and continues to lead to the demand that [&hellip;]</description></oembed>
